Aruba IntroSpect vs Vectra AI comparison

Cancel
You must select at least 2 products to compare!
HPE Aruba Networking Logo
508 views|322 comparisons
100% willing to recommend
Vectra AI Logo
9,274 views|4,303 comparisons
97% willing to recommend
Comparison Buyer's Guide
Executive Summary

We performed a comparison between Aruba IntroSpect and Vectra AI based on real PeerSpot user reviews.

Find out in this report how the two Network Traffic Analysis (NTA) solutions compare in terms of features, pricing, service and support, easy of deployment, and ROI.
To learn more, read our detailed Aruba IntroSpect vs. Vectra AI Report (Updated: May 2024).
772,649 professionals have used our research since 2012.
Featured Review
Quotes From Members
We asked business professionals to review the solutions they use.
Here are some excerpts of what they said:
Pros
"Roaming feature, application control and firewall features.""I haven't heard of any issues with stability.""The most valuable feature is the end-user monitoring. If there is any abnormal behavior on the machine, the administrator will be alerted."

More Aruba IntroSpect Pros →

"The key feature for me for Detect for Office 365 is that it can also concentrate all the information and detection at one point, the same as the network solution does. This is the key feature for me because, while accessing data from Office 365 is possible using Microsoft interfaces, they are not really user-friendly and are quite confusing to use. But Detect for Office 365 is aggregating all the info, and it's only the interesting stuff.""The solution's ability to reduce alerts, by rolling up numerous alerts to create a single incident or campaign, helps in that it collapses all the events to a particular host, or a particular detection to a set of hosts. So it doesn't generate too many alerts. By and large, whatever alerts it generates are actionable, and actionable within the day.""We discovered a lot of things in our network and are correcting several misconfigurations. We are learning how some apps work together and how some things shouldn't happen. It's also easier for us to identify the source of a brute force, whereas before, we didn't even know we had a brute force.""It has reduced the time it takes to respond to attacks. That comes back to the proactive point. It makes us able to lower down in the kill chain, we can react now, rather than reacting to incidents that happened, we can see an instant, in some cases, as it's being implemented, or as it's being launched.""We often use the new feature to create PCAP files from the whole data traffic. It makes it much easier to find network problems such as whether the server is responding to a request. It has nothing to do with security, but it helps a lot to find other problems.""The automatic filtering that they provide is valuable. The logic inside that makes some detections instead of us is very useful. We are confident that if we are just looking into it and there is nothing, nothing could happen.""Cognito Streams gives you a detailed view of what happens in the network in the form of rich metadata. It is just a super easy way to capture network traffic for important protocols, giving us an advantage. This is very helpful on a day-to-day basis.""The packet-capturing feature is very useful."

More Vectra AI Pros →

Cons
"Technical support is a little slow.""I would like to see improvements made to the dashboard, where you can get the information with a simple click.""The packet analyzer needs improvement."

More Aruba IntroSpect Cons →

"They use a proprietary logging format that is probably 90% similar to Bro Logs. Their biggest area of improvement is finishing out the remaining 10%. That 10% might not be beneficial to their ML engine, but that's fine. The industry standard is Zeek Logs or Bro Logs, or Bro or Zeek, depending on how old you are. While they have 90% of those fields, they're still missing some fields. In very rare instances, some community rules do not have the fields that they need, and we had to modify community rules for our logs. So, their biggest area of improvement would be to just finish their matching of the Zeek standard.""We are using SMB 3.0, which is an encrypted protocol. When we get some alerts or something, we cannot go deep into the protocol to see what's wrong because it's encrypted. We need to decrypt the protocol in another way, which is quite difficult. We might go back to SMB 2.0 just for this reason, but that's not a good solution.""It does a little bit of packet capture on alert so you can look at the packet capture activity going on, but it doesn't collect a whole lot of data. Sometimes it's only one or two frames, sometimes it does collect more. That's why they have the addition of their Recall platform, because that really does help expand the capability.""Some of their integrations with other sources of data, like external threat feeds, took a bit more work than I had hoped to get integrated.""I would like to see data processed onshore. Right now, the cloud components, like Office 365, must be processed on servers outside of Australia. I would like to see a future adoption of onshore processing.""The solution has not reduced the security analyst workload in our organization because we still need to SIEM. Unfortunately, while Vectra, for us, is a brilliant tool for network investigations, giving wonderful visibility, it doesn't go the whole way to replace our SIEM that is needed for compliance. So, I still have the same amount of alerting and logging that I did before. It gives us more defined ability to see incidents, but it doesn't give us enough information to satisfy a PCI or 27001 audit.""In education as a sector, we are looking at AI a lot in terms of how it can be used as part of the teaching and learning side of things. It would be great to have Vectra AI look at a better way to enhance the security posture related to the AI tools in our portfolio.""We would like to see more information with the syslogs. The syslogs that they send to our SIEM are a bit short compared to what you can see. It would be helpful if they send us more data that we can incorporate into our SIEM, then can correlate with other events."

More Vectra AI Cons →

Pricing and Cost Advice
  • "The license is based on the number of users. The evaluation license is free, you can download it from the website and try it out first."
  • More Aruba IntroSpect Pricing and Cost Advice →

  • "We are running at about 90,000 pounds per year. The solution is a licensed cost. The hardware that they gave us was pretty much next to nothing. It is the license that we're paying for."
  • "The license is based on the concurrent IP addresses that it's investigating. We have 9,800 to 10,000 IP addresses."
  • "There are additional features that can be purchased in addition to the standard licensing fee, such as Cognito Recall and Stream."
  • "We have a desire to increase our use. However, it all comes down to budget. It's a very expensive tool that is very difficult to prove business support for. We would like to have two separate networks. We have our corporate network and PCI network, which is segregated due to payment processing. We don't have it for deployed in the PCI network. It would be good to have it fully deployed there to provide us with additional monitoring and control, but the cost associated with their licensing model makes it prohibitively expensive to deploy."
  • "At the time of purchase, we found the pricing acceptable. We had an urgency to get something in place because we had a minor breach that occurred at the tail end of 2016 to the beginning of 2017. This indicated we had a lack of ability to detect things on the network. Hence, why we moved quickly to get into the tool in place. We found things like Bitcoin mining and botnets which we closed quickly. In that regard, it was worth the money."
  • "The pricing is very good. It's less expensive than many of the tools out there."
  • "The pricing is high."
  • "Their licensing model is antiquated. I'm not a fan of their licensing model. We have to pay for licensing based on four different things. You have to pay based on the number of unique IPs, the number of logs that we send through Recall and Stream, and the size of our environment. They need to simplify their licensing down to just one thing. It should be based on the amount of data, the number of devices, or something else, but there should be just one thing for everything. That's what they need to base their licensing on. Cost-wise, they're not cheap. They were definitely the most expensive option, but you get what you pay for. They're not the cheapest option."
  • More Vectra AI Pricing and Cost Advice →

    report
    Use our free recommendation engine to learn which Network Traffic Analysis (NTA) solutions are best for your needs.
    772,649 professionals have used our research since 2012.
    Questions from the Community
    Top Answer:Aruba Introspect has two licenses - advanced and standard. While we found the price of the advanced license to be a bit high, the standard license is reasonably priced and costs less than half the… more »
    Top Answer:The two platforms take a fundamentally different approach to NDR. Corelight is limited to use cases that require the eventual forwarding of events and parsed data logs to a security team’s SIEM or… more »
    Top Answer:The solution is currently used as a central threat detection and response system.
    Top Answer:Vectra AI has an annual subscription license. You could choose the components you need for your environment.
    Ranking
    Views
    508
    Comparisons
    322
    Reviews
    0
    Average Words per Review
    0
    Rating
    N/A
    Views
    9,274
    Comparisons
    4,303
    Reviews
    21
    Average Words per Review
    760
    Rating
    8.4
    Comparisons
    Also Known As
    IntroSpect
    Vectra Networks, Vectra AI NDR
    Learn More
    Overview

    Aruba IntroSpect is a User Behavior Analytics (UEBA) tool that uses supervised and unsupervised machine learning to automatically baseline user and device behavior while actively looking for anomalous activity that may indicate a threat. The solution detects compromised users’ systems by identifying changes in typical IT access and usage. By accelerating alert prioritization, incident investigation, and threat-hunting efforts, Aruba IntroSpect can automate the detection of attacks and risky behaviors. In addition, the solution allows security teams to stay ahead of malicious activity and also insecure or negligent users, so they can manage threats before they become damaging. Aruba IntroSpect is suitable for IT organizations of every size and enables businesses to easily and rapidly scale machine-learned behavior detection from small projects to full enterprise deployments.

    Aruba IntroSpect can detect:

    • Account abuse
    • Account takeover
    • Command and control
    • Data exfiltration
    • Lateral movement
    • Password sharing
    • Privilege escalation
    • Flight risk
    • Phishing
    • Ransomware

    Aruba IntroSpect Deployment Options

    • On-premise VM or appliance for Packet Processor
    • AWS or on-premise deployment for Analyzer

    Aruba IntroSpect Data Sources

    The IntroSpect platform can process data sources, including:

    • VPN, FW, IPS/IDS, web proxy, email logs
    • NTA sources: Packets and NetFlow
    • DNS logs
    • Active Directory logs
    • DHCP logs
    • External threat feeds
    • Alerts from third-party security infrastructure

    Aruba IntroSpect Features

    Aruba IntroSpect has many valuable key features. Some of the most useful ones include:

    • Advanced analytics
    • 100+ supervised and unsupervised machine learning models
    • Continuously updated risk scoring
    • Accelerated investigations
    • Packets
    • Flows
    • Logs and alerts
    • Enterprise scale
    • Spark/Hadoop platform

    Aruba IntroSpect Benefits

    There are many benefits to implementing Aruba IntroSpect. Some of the biggest advantages the solution offers include:

    • Fast deployment: Besides having different options for deployment (on-prem or cloud), the solution offers a standalone or integrated platform. For fast deployment, users can ingest data natively or from SIEM, log management, or a packet broker.
    • Efficient: The Aruba IntroSpect solution reduces the time and effort that is required to understand, diagnose, and respond to an attack.
    • Deep insights: Security teams can triage better, make more informed decisions, and respond before damage occurs.
    • Machine learning-based analytics: The solution builds baselines for normal behavior of both individual entities and groups by continuously monitoring IT activities.
    • Comprehensive security profile: When users implement Aruba IntroSpect, they gain access to a security profile with continuous risk scoring and enriched security information.
    • Automatic risk profiles: Aruba IntroSpect automatically creates a risk profile for every user, system, and IoT device connected to the network, saving users an additional step.
    • Proactive threat hunting: Through its query interface, Aruba IntroSpect proactively spots threats without the overhead of finding, searching, and summarizing isolated data stores.
    • Prioritize security risks: Risk scores are based on machine learning that can account for key factors like the order and time of incidents across various attack stages as well as time since detection and business context. Accurate, normalized scores mean security analysts can confidently prioritize their efforts.
    • Instant visibility: When using the solution, users get instant visibility to high-risk activity. Aruba IntroSpect provides access to complete investigative records.

    Vectra threat detection and response is a complete cybersecurity platform that collects, detects, and prioritizes security alerts. The Cognito platform for Network Detection and Response (NDR) detects and responds to attacks inside cloud, data center, Internet of Things, and enterprise networks. The platform also provides automated response capabilities for low-level threats and escalates more severe anomalies to security personnel.

    Cognito captures data for multiple relevant sources and enriches it with context and security insights. It starts by deploying sensors across different networks in datacenters, IoT, or enterprise networks. The algorithm extracts relevant metadata from network and cloud traffic. The information can also be non-security information that can help investigation. 

    The data is enriched with security context to support critical use cases, such as threat detection, investigation, hunting and compliance. The platform is machine learning-based, which enables it to adapt to any new and current threat scenario. It detects, clusters, prioritizes, and anticipates attacks by using identity and host-level enforcement. 

    With the Vectra platform, a person can investigate 50 threats in just two hours. By prioritizing alerts and leveraging threat intelligence, it provides faster results.Vectra solves today’s security challenges for network detection and response. 

    One of Vectra’s best features is the emphasis they put in pairing research and data science for security insights. It offers behavior codification with unsupervised, supervised, and deep learning models. 

    The pricing is according to a subscription model with a free trial available.Vectra is available for Office 365, Azure AD and AWS Brain.

    Features of Vectra AI

    • AI-based threat detection and response. 
    • Detects attacks in real time with behavior-based threat detection. 
    • Consolidates and correlates thousands of events, detecting threats. 
    • Enriches threat investigation with a chain of evidence and data science security insights. 
    • Machine learning techniques, including deep learning and neural networks. 
    • Gives visibility into cyberattackers and analyzes all network traffic. 
    • Continuous updates with new threat detection algorithms. 
    • Provides encryption at rest and in transit. For the AWS version, it offers AES-256 encryption via AWS Key Management Service. 
    • Guaranteed availability according to the SLA of the service selected. 
    • Does not connect to public sector networks. 

    Benefits of Vectra AI

    • Behavioral models use AI to find unknown attackers. 
    • Context increases the accuracy of threat hunting. 
    • Allows for proactive action by prioritizing the most relevant information. 
    • Provides a clear picture and extensive context for investigations. 
    • Aids decision-making in the incident response process. 
    • Helps working with large datasets by capturing metadata at scale. 
    • Automates time-consuming analysis. 
    • Reduces the security analysts’ workloads on threat investigations. 

    Other advantages of Vectra services include that they can be deployed in the public, private, or hybrid cloud. Support is available via email or online ticketing with an average of 4 hours of response. Phone support is available 24/7. 

    Vectra provides full on-site and online training and documentation. Regarding the user interface, it supports several types of web browsers, such as Internet Explorer, Microsoft Edge, Firefox, Chrome, Safari and Opera. However, it is not available for mobile devices.

    Reviews from Real Users

    Here’s what PeerSpot users of Vectra AI have to say about it:

    "One of the core features is that Vectra AI triages threats and correlates them with compromised host devices. From a visibility perspective, we can better track the threat across the network. Instead of us potentially finding one device that has been impacted without Vectra AI, it will give us the visibility of everywhere that threat went. Therefore, visibility has increased for us." - Dave W., Operations Manager at a healthcare company

    "It does a reliable job of parsing out the logs of all the network traffic so that we can ingest them into our SIEM and utilize them for threat hunting and case investigations. It is pretty robust and reliable. The administration time that we spend maintaining it or troubleshooting it is very low.” - T.S., Senior Security Engineer at a manufacturing company

    Sample Customers
    Sage Hotel, Centara Hotels and Resorts, Asda, The Dolder Grand,
    Tribune Media Group, Barry University, Aruba Networks, Good Technology, Riverbed, Santa Clara University, Securities Exchange, Tri-State Generation and Transmission Association
    Top Industries
    VISITORS READING REVIEWS
    Computer Software Company15%
    Retailer9%
    Construction Company8%
    Financial Services Firm7%
    REVIEWERS
    Financial Services Firm16%
    Manufacturing Company11%
    University11%
    Mining And Metals Company8%
    VISITORS READING REVIEWS
    Computer Software Company16%
    Financial Services Firm12%
    Government8%
    Manufacturing Company6%
    Company Size
    VISITORS READING REVIEWS
    Small Business49%
    Midsize Enterprise9%
    Large Enterprise43%
    REVIEWERS
    Small Business17%
    Midsize Enterprise21%
    Large Enterprise62%
    VISITORS READING REVIEWS
    Small Business22%
    Midsize Enterprise14%
    Large Enterprise64%
    Buyer's Guide
    Aruba IntroSpect vs. Vectra AI
    May 2024
    Find out what your peers are saying about Aruba IntroSpect vs. Vectra AI and other solutions. Updated: May 2024.
    772,649 professionals have used our research since 2012.

    Aruba IntroSpect is ranked 14th in Network Traffic Analysis (NTA) while Vectra AI is ranked 2nd in Network Traffic Analysis (NTA) with 42 reviews. Aruba IntroSpect is rated 8.6, while Vectra AI is rated 8.6. The top reviewer of Aruba IntroSpect writes "A straightforward setup for technical users and an overall good product". On the other hand, the top reviewer of Vectra AI writes "Integrates well with other security solutions and provides good technical support". Aruba IntroSpect is most compared with Arista NDR, Cisco Secure Network Analytics, LogRhythm UEBA, Darktrace and SolarWinds NetFlow Traffic Analyzer, whereas Vectra AI is most compared with Darktrace, ExtraHop Reveal(x), Cisco Secure Network Analytics, Arista NDR and Corelight. See our Aruba IntroSpect vs. Vectra AI report.

    See our list of best Network Traffic Analysis (NTA) vendors.

    We monitor all Network Traffic Analysis (NTA) reviews to prevent fraudulent reviews and keep review quality high. We do not post reviews by company employees or direct competitors. We validate each review for authenticity via cross-reference with LinkedIn, and personal follow-up with the reviewer when necessary.